1. blogpost-image of a desktop screen with the facebook logo and a lock

    Quick Guide to Social Media Privacy

    When used correctly, social media can be used for good; it can help promote business, build and maintain connections to family, friends, coworkers, and potential business associates, and provide endless hours of entertainment. By nature, social media sites are used to share user-generated content; it is central to the function of these sites. While this sharing may not necessarily be a bad thing, it is important to be aware of the privacy concerns.

    Read more
  2. blogpost-image of a laptop displaying a facebook log in screen and a tumbs up icon

    Seventeen Years of Facebook

    Seventeen years ago, roommates Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes published thefacebook.co. Nobody could have foreseen the impact this would bring, having today over 2.5 billion monthly active users worldwide.

    Read more
  3. blogpost-image of a laptop displaying Privacy Policy and a checkmark

    Read Between the Privacy Policies Lines

    As a citizen of the 21st century, it’s most likely that you have browsed the Internet, shopped online, or even binged on a “television” series. If you have done any of these activities online, you probably have been asked to agree on Terms of Use and Privacy Policies.

    Read more
  4. blogpost-image of a laptop displaying a password field and a lock

    Tips on Creating a Strong Password

    Upper case, lower case, numbers, symbols, the tears of your enemies…a strong password creation sometimes requires thought and patience, and even though we have been using the internet for quite a while, most people still struggle with this task.

    Read more
  5. illustration of Phil Zimmermann & Phil Dunkelberger

    What is PGP Encryption? An Inside Look With Phil Zimmermann & Phil Dunkelberger

    PGP encryption is a critical security feature of StartMail’s email service – it scrambles the contents of your messages so that it can’t be read by anyone other than the sender and the intended recipient. And they really mean no one can read it, not even them! Though technologically complicated, they made it extremely user-friendly for StartMail users, ensuring that there are no obstacles to your email privacy.

    Read more
  6. blogpost-image of a laptop displaying the StartMail website with a Holiday Special banner and an illustrated lock

    New Year’s Online Safety Commandments

    If you are into privacy like we are, these online privacy commandments are for you! Plus they’re way easier and more fulfilling than diets and excercise!

    Read more
  7. blogpost-image of a cappuccino with an illustrated heart, next to a phone displaying the StartMail logo

    Things We Love About Startmail

    We, as StartMail employees, are also StartMail users, which helps us understand our product in the best way possible and adapt it into something functional and practical for our daily activities

    Read more
  8. blogpost-image of an ipad displaying a Black Friday website with an illustrated arrow pointing to it

    Safety Tips for Black Friday Online Shopping

    We all love a good deal when acquiring our favorite items, and Black Friday is the paradise for those who love to save and shop. Here are some tips & tricks to protect your personal data & enjoy some nice retail therapy!

    Read more
  9. blogpost-image of a man looking at his laptop screen with an illustrated lock

    Why Encryption Is So Important for Our Society

    Should the EU authorities be given backdoors to encrypted services?

    Read more
  10. blogpost-image of a man looking at his laptop with an illustrated security shield with an email envelope inside

    Endpoint Security Working From Home

    With the rise of coronavirus cases, many companies have been forced to change their working scheme and adapt to a completely remote environment. For some, not much changed, but for others, the work-from-home situation was uncharted territory that introduced potential security traps. […]

    Read more